Skip to main content

Home/ Ad4dcss/Digital Citizenship/ Group items tagged BACK

Rss Feed Group items tagged

Rof Harris

Immediate Payday Cash Loans - get same day cash backing until your next payday! - 0 views

Trying to find instant extra financial help rapidly? The borrower may meet the criteria to get same day cash backing until your next payday. Have the loan amount transferred into your activate bank...

loans in minutes instant loans immediate cash loans immediate loans immediate payday loans Short term payday loans

started by Rof Harris on 17 Jan 17 no follow-up yet
Rof Harris

Immediate Payday Cash Loans - get same day cash backing until your next payday! - 0 views

Trying to find instant extra financial help rapidly? The borrower may meet the criteria to get same day cash backing until your next payday. Have the loan amount transferred into your activate bank...

loans in minutes instant loans immediate cash loans immediate loans immediate payday loans Short term payday loans

started by Rof Harris on 28 Dec 16 no follow-up yet
Loans Finder

Same Day Cash Loans Offer To Receive Easy Money Within Few Hours! - 0 views

  •  
    Same Day Cash Loans can be availed, actually without responsibility much of a risk. If you are looking to get the very same day cash backing with ease, then the people can best make use of the online loan application process without any hassle. @ http://www.loansfinder.com.au/quick-cash-loans.html
Loans Finder

100% Online Application - Loans Finder - 0 views

  •  
    they are quick cash backing arranged for your needy...
Anne Bubnic

Facebook forced into revealing identities of cyberbullies - 1 views

  •  
    "Facebook must now reveal the names, email and IP addresses of those behind abusive messages, showing who they are and where they posted from in a case where a woman won court backing to reveal the identities of cyberbullies who targeted her with a string of abusive messages on Facebook.
Anne Bubnic

Text messages become a growing weapon in dating violence - 3 views

  •  
    The text messages to the 22-year-old Virginia woman arrived during the day and night, sometimes 20 or 30 at once. Her ex-boyfriend wanted her back. He would not be refused. He texted and called 758 times.
Anne Bubnic

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • ...3 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
Anne Bubnic

Protecting Your Online Identity and Reputation - 0 views

  • Remember that nothing is temporary online. The virtual world is full of opportunities to interact and share with people around the world. It's also a place where nothing is temporary and there are no "take-backs." A lot of what you do and say online can be retrieved online even if you delete it — and it's a breeze for others to copy, save, and forward your information.
  • Mark your profiles as private. Anyone who accesses your profile on a social networking site can copy or screen-capture information and photos that you may not want the world to see. Don't rely on the site's default settings. Read each site's instructions or guidelines to make sure you're doing everything you can to keep your material private.
  • Safeguard your passwords and change them frequently. If someone logs on to a site and pretends to be you, they can trash your identity. Pick passwords that no one will guess (don't use your favorite band or your dog's birthday; try thinking of two utterly random nouns and mixing in a random number), and change them often. Never share them with anyone other than your parents or a trusted adult. Not even your best friend, boyfriend, or girlfriend should know your private passwords!
  • ...6 more annotations...
  • Don't post inappropriate or sexually provocative pictures or comments. Things that seem funny or cool to you right now might not seem so cool years from now — or when a teacher, admissions officer, or potential employer sees them. A good rule of thumb is: if you'd feel weird if your grandmother, coach, or best friend's parents saw it, it's probably not a good thing to post. Even if it's on a private page, it could be hacked or copied and forwarded.
  • Don't respond to inappropriate requests. Research shows that a high percentage of teens receive inappropriate messages and solicitations when they're online. These can be scary, strange, and even embarrassing. If you feel harassed by a stranger or a friend online, tell an adult you trust immediately. It is never a good idea to respond. Responding is only likely to make things worse, and might result in you saying something you wish you hadn't.
  • Take a breather to avoid "flaming." File this one under "nothing's temporary online": If you get the urge to fire off an angry IM or comment on a message board or blog, it's a good idea to wait a few minutes, calm down, and remember that the comments may stay up (with your screen name right there) long after you've regained your temper and maybe changed your mind.
  • Learn about copyrights. It's a good idea to learn about copyright laws and make sure you don't post, share, or distribute copyrighted images, songs, or files. Sure, you want to share them, but you don't want to accidentally do anything illegal that can come back to haunt you later.
  • Check yourself. Chances are, you've already checked your "digital footprint" — nearly half of all online users do. Try typing your screen name or email address into a search engine and see what comes up. That's one way to get a sense of what others see as your online identity.
  • Take it offline. In general, if you have questions about the trail you're leaving online, don't be afraid to ask a trusted adult. Sure, you might know more about the online world than a lot of adults do, but they have life experience that can help.
  •  
    Advice for teens from www.kidshealth.org. Here are some things to consider to safeguard your online identity and reputation:
    1. Remember that nothing is temporary online
    2. Mark your profile as private.
    3. Safeguard your passwords and change them regularly.
    4. Don't post inappropriate or sexually provocative pictures or comments.
    5. Don't respond to inappropriate requests
    6. Take a breather to avoid "flaming."
    7. Learn about copyrights.
    8. Check your digital footprint.
    9. Take it offline.
Anne Bubnic

Your Child's Digital Footprint - 1 views

  •  
    Back in the day, people thought they could be anonymous online. Now everyone knows Internet activity leaves a trail. Some of those footprints are the unintended byproduct of other activities like shopping or registering to get access to a website. Other footprints are deliberate-a mark in the digital sand that says "I was here."
Anne Bubnic

Letters To A Bullied Girl: Messages of Healing & Hope [New Book] - 0 views

  • Olivia Gardner, a teenager from Northern California, had been severely bullied in school. After reading of her ordeal in a local newspaper, we were shocked. Olivia had endured so much pain. Her book bag had been dragged through the mud, her schoolmates had created an "Olivia's Haters" page on the internet, and they would whisper "Die Olivia" to her in the halls. Olivia's story broke our hearts, especially when we learned that she was suicidal. We couldn't imagine such cruelty.
  • livia's story moved us, and a spark ignited between us - we both recognized that there was something that had to be done about this situation. We knew we couldn't be bystanders. We organized a letter-writing campaign and asked our friends to write letters of encouragement to Olivia. These messages of healing and hope were the least we could send to Olivia to let her know that she was not alone and that we were thinking about her and hoping she would get better.
  • Heartfelt, honest and powerful letters started pouring in. And then came the media requests. The more attention the "Olivia's Letters" project got, the more letters we received. Suddenly, we were thrust into the world of bullying, as we read the letters sent to Olivia by former bullies and targets of these bullies. We learned of the remorse adults felt having been bullies themselves in their teen years, and of the depression the targets of bullies still experience years after they have been bullied. Thousands of letters from all over the country and even the world flooded into Olivia's mailbox, each offering a unique perspective on courage and compassion.
  • ...2 more annotations...
  • We could never have predicted what a great and widespread response our little project to help one girl would receive. In a matter of a few weeks we became activists. Today, as the authors of the book Letters to a Bullied Girl: Messages of Healing and Hope, a compilation of some of the most revealing letters sent to Olivia, we are hopeful that the letter-writers' message to end the vicious cycle of bullying will continue to spread
  • As the letters in this book prove, bullying has serious consequences. We can no longer turn away or sit idly by as our peers are bullied so severely and relentlessly that they are forced to withdraw, isolate themselves and even turn to suicide. Our book is dedicated to Corinne Sides, who committed suicide as a result of bullying, and there are pages of letters from others who attempted suicide to escape their bullies.
  •  
    As teens across the country head back to school this year, far too many of them are facing the entrance doors to their schools with feelings of fear, trepidation and dread. For an increasing number of students across the nation, schooldays are filled with the never-ending cycle of taunting and abuse from their bullies. But this year, in an unprecedented display of solidarity, thousands of strangers who have been through the same harrowing experiences, are sharing their private tales of torment with these teens for the first time ever because of the story of Olivia Gardner.
Anne Bubnic

As 'Trolling' Turns More Vicious, What, If Anything, Can Stop It? - 0 views

  •  
    One afternoon in the spring of 2006, for reasons unknown to those who knew him, Mitchell Henderson, a seventh grader from Rochester, Minnesota, took a .22-caliber rifle down from a shelf in his parents' bedroom closet and shot himself in the head. The next morning, Mitchell's school assembled in the gym to begin mourning. His classmates created a virtual memorial on MySpace and garlanded it with remembrances. One wrote that Mitchell was a "hero to take that shot, to leave us all behind. God do we wish we could take it back." Someone e-mailed a clipping of Mitchell's newspaper obituary to MyDeathSpace.com, a Web site that links to the MySpace pages of the dead.
Anne Bubnic

Board to return cell phones to students [Augusta Chronicle] - 0 views

  •  
    With its evidence room overflowing with cell phones, the Richmond County school board is wanting to give away what it has taken 15 years to collect. The board decided to give the phones back to students when it changed its policy for cell phones in June. The policy replaces the often-criticized rule to seize phones for 365 calendar days when a pupil is caught with one. In 15 years, 5,725 phones were taken from students, according to the public safety department. Of those, 4,566 were still being held by the department this summer. Under the new rules, a parent has 10 days to claim a phone before it is turned in to public safety on the first offense. For a second offense and any phones not claimed at the school on the first offense, public safety takes the phone for 30 days.
Anne Bubnic

ParentCare Software from MySpace - 0 views

  •  
    This is great information to distribute at your next PTA meeting! The MySpace folks put control back in the hands of parents with their new ParentCare Software, a free, simple software tool designed to help parents safeguard their teens. ParentCare helps parents determine whether a child has a MySpace profile and validates the age, user name, and location listed by the teen. Currently in beta form and available for Windows users only. Both MySpace and IKeepSafe provide links to the download. The IKeepSafe site provides an additional flash video explaining the software. It is located at: http://www.ikeepsafe.org/parentcare/index.php
Anne Bubnic

The Fight Against Cyberbullying - 0 views

  •  
    As tales of online cruelty mount, districts are trying a mix of prevention and punishment, incorporating internet safety into curriculum and tightening student conduct codes.Whether a pattern or merely an unfortunate streak, what's not disputed is the direction of the general drift in cyberbullying cases: upward. Once relegated to the playgrounds and back lots, the schoolyard bully now finds prey online. While the states are responding to cyberbullying by adopting legislation that mixes prevention with punishment, for school districts the issue quickly turns from educating the community about the threat of cyberbullying to crafting a response when an incident actually occurs. Districts are realizing that integrating internet safety education into curriculum isn't enough. They must also address cyberbullying in their conduct and discipline codes.
Anne Bubnic

How To Stop Cyber-Bullying - 0 views

  • Yet with so many different types of cyberbullying, ranging from online impersonation to e-mail hacking and distributing embarrassing materials about a person, it can be difficult for kids, let alone those trying to help them, to know how to respond and stop the 21st century bully in his or her tracks. "Awareness about the issue is high, but awareness about what to do when it happens is mixed," says Michele Ybarra, president and research director for Internet Solutions for Kids (ISK) and an adjunct faculty member at Johns Hopkins School of Public Health.
  • Research suggests that those on the receiving end of traditional bullying may be more likely to cyberbully as a form of retaliation. Kids involved in the more severe instances of cyberbullying also tend to have more psychosocial problems, exhibiting aggression, getting in trouble at school and having poor relationships with their parents, says Nancy Willard, an expert on cyberbullying and author of Cyberbullying and Cyberthreats. And while traditional bullying appears to peak in middle school and drop off as kids reach high school, cyberbullying tends to slightly increase among kids in high school, a trend researchers can't yet explain.
  • One of the tricky things about helping cyberbullying targets is that they aren't always willing to talk about the problem. Teens often cite a fear of having their Internet privileges revoked as a reason for keeping quiet, Agatston says. Kids who receive threatening messages in school may not divulge what's happened for fear of getting in trouble, since many schools ban use of cellphones during the day. To get around that problem, Willard recommends having a frank discussion with your children about cyberbullying before it happens.
  • ...1 more annotation...
  • Research is also beginning to show that just like traditional forms of bullying, cyberbullying can lead to anxiety, lower rates of self-esteem and higher rates of school absence, says Patti Agatston, a licensed professional counselor with the Prevention/Intervention Center, a student assistance program serving more than 100 schools in suburban Atlanta, Ga.
  •  
    Kids can be mean.\n\nIt's a fact of life we've all experienced. Gone are the days, however, when avoiding a bully meant ducking out of the back door at school. Thanks to personal computers, cellphones and instant messaging, it's now easier than ever for children to attack each other, often anonymously.
Anne Bubnic

Tosa East student arrested, fined for repeated texting - 0 views

  •  
    Wauwatosa East High School resource officer who made the arrest says the student refused to stop texting during class Feb. 11 after a teacher told her to stop and the student told the resource officer she didn't have a phone. She continued denying she had a phone, forcing the resource officer to walk back and forth to the classroom twice and find other students who saw her using it, according to the report
Anne Bubnic

Kiva - Loans that change lives - 0 views

  •  
    Just as YouTube has changed the way we watch video and Wikipedia has changed the way we find information, Kiva.org - the world's first online person-to-person microlending platform - is changing the way we give back. Kiva lets you lend to a specific entrepreneur in third world countries, empowering them to lift themselves out of poverty. There are many great classroom connections here for global citizenship, math, geography etc. Kiva also allows you to develop a social network with other contributors supporting the same entrepreneur.
Colette Cassinelli

Bulletin Board [PSA] - 0 views

  •  
    Bulletin Board video - "Once you post your image online - you can't take it back"
Colette Cassinelli

Netsmartz: Real Life Stories [Video] - 0 views

  •  
    These powerful stories teach teens to examine their behavior and encourage them to be proactive in preventing victimization of themselves and others.Teens share their own "Real-Life Stories" about issues affecting them on the Internet such as cyberbullying, online enticement, and giving out too much personal information. At CTAP, we love these videos and frequently feature them in our workshops and trainings "Feathers in the Wind" and "You Can't Take It Back" are two of our favorites. "Amy's Choice" is also a compelling video clip.
‹ Previous 21 - 40 of 140 Next › Last »
Showing 20 items per page